咨询与建议

限定检索结果

文献类型

  • 11,959 篇 会议
  • 5,377 篇 期刊文献
  • 230 册 图书

馆藏范围

  • 17,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,635 篇 工学
    • 8,443 篇 计算机科学与技术...
    • 7,051 篇 软件工程
    • 2,088 篇 信息与通信工程
    • 1,380 篇 控制科学与工程
    • 1,164 篇 生物工程
    • 865 篇 电气工程
    • 779 篇 生物医学工程(可授...
    • 703 篇 机械工程
    • 627 篇 电子科学与技术(可...
    • 577 篇 光学工程
    • 448 篇 安全科学与工程
    • 365 篇 仪器科学与技术
    • 365 篇 化学工程与技术
    • 349 篇 动力工程及工程热...
    • 338 篇 建筑学
    • 332 篇 交通运输工程
  • 4,759 篇 理学
    • 2,749 篇 数学
    • 1,307 篇 生物学
    • 905 篇 物理学
    • 788 篇 统计学(可授理学、...
    • 659 篇 系统科学
    • 379 篇 化学
  • 3,278 篇 管理学
    • 1,996 篇 管理科学与工程(可...
    • 1,404 篇 图书情报与档案管...
    • 991 篇 工商管理
  • 772 篇 医学
    • 674 篇 临床医学
    • 603 篇 基础医学(可授医学...
    • 359 篇 药学(可授医学、理...
  • 517 篇 法学
    • 401 篇 社会学
  • 344 篇 经济学
    • 341 篇 应用经济学
  • 338 篇 教育学
  • 196 篇 农学
  • 73 篇 文学
  • 49 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,078 篇 computer science
  • 1,024 篇 software enginee...
  • 342 篇 deep learning
  • 314 篇 computational mo...
  • 306 篇 application soft...
  • 281 篇 data mining
  • 268 篇 machine learning
  • 264 篇 accuracy
  • 248 篇 computer archite...
  • 231 篇 feature extracti...
  • 227 篇 software
  • 217 篇 support vector m...
  • 210 篇 training
  • 207 篇 internet of thin...
  • 204 篇 software systems
  • 184 篇 programming
  • 171 篇 optimization
  • 166 篇 educational inst...
  • 165 篇 semantics
  • 158 篇 laboratories

机构

  • 354 篇 college of compu...
  • 198 篇 department of co...
  • 139 篇 state key labora...
  • 118 篇 department of co...
  • 115 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 81 篇 school of inform...
  • 78 篇 department of co...
  • 75 篇 department of co...
  • 72 篇 department of co...
  • 69 篇 department of co...
  • 63 篇 school of comput...
  • 52 篇 department of co...
  • 47 篇 department of co...
  • 47 篇 software enginee...
  • 46 篇 department of co...
  • 44 篇 school of comput...
  • 41 篇 department of co...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 39 篇 xiao qin
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 mian ajmal
  • 29 篇 shen furao
  • 28 篇 zhao jian
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 liu yang
  • 22 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 21 篇 niyato dusit
  • 21 篇 rehman attique u...
  • 21 篇 bens pardamean
  • 20 篇 dozier gerry

语言

  • 15,863 篇 英文
  • 1,594 篇 其他
  • 137 篇 中文
  • 11 篇 德文
  • 4 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Master of Computer Science and Software Engineering Department"
17566 条 记 录,以下是481-490 订阅
排序:
A computer Vision-Based Vehicle Detection System Leveraging Deep Learning  1
A Computer Vision-Based Vehicle Detection System Leveraging ...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Khan, Saadullah Vohra, Sanayna Siddique, Sultan Abdullah Abro, Abdul Ahad Ebrahim, Mansoor Iqra University Main Campus Department of Software Engineering Karachi Pakistan Iqra University Main Campus Department of Computer Science Karachi Pakistan
This study uses advanced computer vision (CV) and deep learning (DL) techniques to present a combined approach for extensive vehicle detection and number plate recognition. Improving the effectiveness and precision of... 详细信息
来源: 评论
System for Table Run Strategy in Peruvian Billiards with Real-Time Oject Detection using YOLOv8n  10
System for Table Run Strategy in Peruvian Billiards with Rea...
收藏 引用
10th International Conference on Optimization and Applications, ICOA 2024
作者: Silva, Italo Chavez, Raquel Castillo-Sequera, José Luis Wong, Lenis Peruvian University of Applied Sciences Department of Software Engineering Lima Peru University of Alcalá Department of Computer Science Alcalá de Henares Spain
The main challenge for billiard players, regardless of their skill level, is to develop a strategy that allows them to consecutively pocket balls in a single turn, commonly known as 'closing the table.' This s... 详细信息
来源: 评论
Group Recommendation Method Based on Graph Neural Network
Group Recommendation Method Based on Graph Neural Network
收藏 引用
2024 International Conference on Cyber-Physical Social Intelligence, ICCSI 2024
作者: Lu, Mengye Zhu, Peng Miao, Chun Wang, Youjian Wang, Jiacun Nanjing University of Science and Technology School of Economics and Management Nanjing China Monmouth University Department of Computer Science and Software Engineering NJ United States
Group activities are becoming more and more common on the Internet in the big data environment. Which makes many scholars focus on how to recommend items or activities to a group. However, conventional recommendation ... 详细信息
来源: 评论
Predictive Modeling of Students' Stress Levels Using Machine Learning Algorithm  4
Predictive Modeling of Students' Stress Levels Using Machine...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Ali, Hassan Amin, M. Hamza Rehman, Attique Ur Javaid, Sabeen Ali, Tahir Muhammad Mir, Azka University of Sialkot Department of Software Engineering Sialkot Pakistan GULF University for Sciences and Technology Department of Computer Science Mubarak Al-Abdullah Kuwait
The increasing prevalence of stress among university students has raised concern about its impact on academic performance and overall well-being. This conference paper explores the applications of machine learning alg... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论
Decentralized Face Identification with Hierarchical Navigable Small World on Blockchain
Decentralized Face Identification with Hierarchical Navigabl...
收藏 引用
2023 International Conference on Machine Learning and Automation, CONF-MLA 2023
作者: Lee, Hsiang-Hung Chen, Yiting Department of Computer Science & Information Engineering National Taiwan Normal University Taipei City106 Taiwan Department of Computer Software and Theory Donghua University Shanghai201620 China
This paper presents a novel method for decentralized storage in deep-learning-based face recognition systems using the Hierarchical Navigable Small World (HNSW) algorithm. The proposed solution utilizes Ethereum smart... 详细信息
来源: 评论
TezNet: An Efficient Convolutional Neural Network for Optical Coherence Tomography Classification  6
TezNet: An Efficient Convolutional Neural Network for Optica...
收藏 引用
6th International Conference on Robotics and Automation in Industry, ICRAI 2024
作者: Qaiser, Muhid Abbas, Muhammad Sohail Muhammad, Asif Haider, Khadija Khan, Haroon National University of Computer and Emerging Sciences Department of Artificial Intelligence and Data Science Islamabad Pakistan National University of Computer and Emerging Sciences Department of Software Engineering Islamabad Pakistan
Retinal diseases such as Choroidal Neovascularization (CNV), Drusen, and Diabetic Macular Edema (DME) can severely impair vision and are challenging to reverse if detected late. Optical Coherence Tomography (OCT) serv... 详细信息
来源: 评论
Variational Auto-Encoder Model and Federated Approach for Non-Intrusive Load Monitoring in Smart Homes  28
Variational Auto-Encoder Model and Federated Approach for No...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Kaspour, Shamisa Yassine, Abdulsalam Department of Computer Science Thunder Bay Canada Lakehead University Department of Software Engineering Thunder Bay Canada
Non-Intrusive Load Monitoring (NILM) is a technique used for identifying individual appliances' energy consumption from a household's total power usage. This study examines a novel energy disaggregation model ... 详细信息
来源: 评论
Voice Presentation Attacks Detection using Acoustic MLTP Features and BiLSTM  3
Voice Presentation Attacks Detection using Acoustic MLTP Fea...
收藏 引用
3rd International Conference on Communication, Computing and Digital Systems, C-CODE 2023
作者: Ibrar, Sundas Javed, Ali Ilyas, Hafsa Uet Taxila Department of Computer Science Punjab Pakistan Uet Taxila Department of Software Engineering Punjab Pakistan
Automatic speaker verification (ASV) systems have been used in numerous voice-controlled technologies including voice banking, automobiles, smartphones, smart homes, etc. The growth of voice-operated devices is increa... 详细信息
来源: 评论
Body Worn Sensors for Health Gaming and e-Learning in Virtual Reality
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 4763-4777页
作者: Mir Mushhood Afsar Shizza Saqib Yazeed Yasin Ghadi Suliman A.Alsuhibany Ahmad Jalal Jeongmin Park Department of Computer Science Air UniversityIslamabad44000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain15551UAE Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Computer Engineering Tech University of Korea237 Sangidaehak-roSiheung-siGyeonggi-do15073Korea
Virtual reality is an emerging field in the whole *** problem faced by people today is that they are more indulged in indoor technology rather than outdoor ***,the proposed system introduces a fitness solution connect... 详细信息
来源: 评论